Search results for: internet service providers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5474

Search results for: internet service providers

5054 A Study on the Usage of Library versus the Internet as Sources of Information with Reference to the Undergraduate Students in the Faculties of Humanities, Social Sciences, Science and Commerce and Management in the University of Kelaniya

Authors: Dilini Bodhinayaka, Aunsha Sajeewanie Rubasinghe

Abstract:

The library of the University of Kelaniya plays a significant role in supporting the academic work of the university. As at July, 2016 the library of the University of Kelaniya comprised of 250301 printed books, 2157 CD-ROMs, 1203 theses and 800 non-book materials. Furthermore, the library is subscribed to about 60 local journals, access to over 12,500 full text academic journals and around 100,000 e-books. The library provides the services and resources that support in teaching, doing research and learning. On the other hand, undergraduate students have adopted and continued to use the online information retrieval for their academic and research work. This study aims to compare the usage of internet and the usage of library among undergraduates in the faculties of Humanities, Social Sciences, Science and Commerce & Management in the University of Kelaniya. Also, the research attempts to determine the factors of enthusiasm or the disinterest in the students in using library and Internet. All the undergraduate students in the University (8440 students at the time of the study) were taken as the population of the study and the sample of 15% was selected out of the population using stratified sampling method. A total of 1266 questionnaires were distributed among undergraduates of the above mentioned faculties. The qualitative data were analyzed using Descriptive Statistical Method. Findings, of the study indicated that undergraduate students of the faculties of Humanities, Social Sciences, Science and Commerce & Management use both the library and the internet to fulfill their information needs. But, the students in the faculty of Science and Commerce & Management use the internet sources more than the library. The undergraduates in the faculties of Humanities and Social Sciences frequently use the university library than the internet. Although, majority agreed that the internet is the most preferred source of information they have no an adequate awareness about the available internet resources in the E-library of the University of Kelaniya.

Keywords: university libraries, University of Kelaniya, online resources, undergraduates in Sri Lanka

Procedia PDF Downloads 238
5053 Enabling Service Innovation in Higher Education Institutions by Means of Leveraging Knowledge Management Practices

Authors: Mulalo Mushaisano

Abstract:

It has been revealed in the existing literature that specific knowledge management practices can be implemented and utilized in organizations to enable sustaining service innovation. This kind of innovation is of crucial importance in service environments such as institutions of higher education because it allows the delivery of enhanced services which are designed to add value and deliver better services to clients. However, there is a widespread lack of the necessary implementation of essential knowledge practices in higher education institutions owing to a variety of internal challenges and barriers. The primary objective of the study was to identify the essential knowledge management practices required for the enablement of service innovation. The main outcome was the development of a framework of knowledge management practice which can be applied in institutions of higher education to achieve service innovation. The study will address the gap in where existing literature mostly explored the aforementioned processes in the context of commercial and corporate organizations and not in the higher education environment.

Keywords: higher education, innovation, knowledge management, service innovation

Procedia PDF Downloads 143
5052 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 374
5051 Building Energy Modeling for Networks of Data Centers

Authors: Eric Kumar, Erica Cochran, Zhiang Zhang, Wei Liang, Ronak Mody

Abstract:

The objective of this article was to create a modelling framework that exposes the marginal costs of shifting workloads across geographically distributed data-centers. Geographical distribution of internet services helps to optimize their performance for localized end users with lowered communications times and increased availability. However, due to the geographical and temporal effects, the physical embodiments of a service's data center infrastructure can vary greatly. In this work, we first identify that the sources of variances in the physical infrastructure primarily stem from local weather conditions, specific user traffic profiles, energy sources, and the types of IT hardware available at the time of deployment. Second, we create a traffic simulator that indicates the IT load at each data-center in the set as an approximator for user traffic profiles. Third, we implement a framework that quantifies the global level energy demands using building energy models and the traffic profiles. The results of the model provide a time series of energy demands that can be used for further life cycle analysis of internet services.

Keywords: data-centers, energy, life cycle, network simulation

Procedia PDF Downloads 147
5050 Bible of Hospitality: Considering the Hotel Business through the Prism of the Evangelical Approach

Authors: Rimma Kiseleva

Abstract:

The hotel business has a long history. The basis of the service of hospitality industry enterprises is the service, attitude, and consciousness of employees as hospitable “hosts of the house”. It is generally accepted that the founder and main expert of quality service is Caesar Ritz, “the king of hoteliers and the hotelier of kings.” However when deeply immersed in the history of the universe, it turns out that the very first book about hospitality, standardization of guest reception processes and the basics of better service is nothing more than the Bible. A unique study on the topic of considering the Church as a hotel, as well as the hotel business itself as the most gracious work of Jesus Christ Himself, which is confirmed by verses from the Gospel, includes the following approaches: analytical, comparative, empirical. The study shows that it was Jesus Christ who became the founder of the rules of the most sacrificial service, real service to people, filled with brotherly love, humility, love for strangers, those qualities that are the foundation, the “three pillars” of the hospitality industry. And also that the hotel is the most charitable cause, which is still relevant today.

Keywords: Augustine Aurelius, Bible, Gospel, guest house, hospitality, hotel, humility, inn, Jesus Christ, Joseph Fletcher, New Testament, Paul Tillich, service, strangeness

Procedia PDF Downloads 51
5049 Review of Cable Fault Locating Methods and Usage of VLF for Real Cases of High Resistance Fault Locating

Authors: Saadat Ali, Rashid Abdulla Ahmed Alshehhi

Abstract:

Cable faults are always probable and common during or after commissioning, causing significant delays and disrupting power distribution or transmission network, which is intolerable for the utilities&service providers being their reliability and business continuity measures. Therefore, the adoption of rapid localization & rectification methodology is the main concern for them. This paper explores the present techniques available for high voltage cable localization & rectification and which is preferable with regards to easier, faster, and also less harmful to cables. It also provides insight experience of high resistance fault locating by utilization of the Very Low Frequency (VLF) method.

Keywords: faults, VLF, real cases, cables

Procedia PDF Downloads 112
5048 The Visualization of the Way of Creating a Service: Slavic Liturgical Books. Between Text and Music

Authors: Victoria Legkikh

Abstract:

To create a new Orthodox service of Jerusalem rite and to make it possible for a performance, one had to use several types of books. These are menaions and triodion, cleargy service book, stichirarion and typikon. These books keep a part of the information about the service, which a medieval copyist had to put together like a puzzle. But an abundance of necessary books and their variety created a lot of problems in copying services. The main problem was the difference of text in notated and not notated manuscripts (they were corrected at a different time) and lack of information in typikon, which provided only a type of hymns and their mode. After all, a copyist could have both corrected and not corrected manuscripts which also provided a different type of service. It brings us to the situation when we hardly have a couple of manuscripts containing the same service, and it is difficult to understand which changes were made voluntarily and which ones were provided by different types of available manuscripts. A recent paper proposes an analysis of every type of liturgical book and a way of using them in copying and correcting a service so we can divide voluntary changes and changes due to various types of books. The paper also proposes an index showing the “material” life of hymns in different types of manuscripts and the changes of its version and place in the same type of manuscript. This type of index can help in reconstructing the way of creation/copying service and can be useful for publication of the services providing necessary information of every hymn in every used manuscript.

Keywords: orthodox church music, creation, manuscripts, liturgical books

Procedia PDF Downloads 173
5047 Solving the Wireless Mesh Network Design Problem Using Genetic Algorithm and Simulated Annealing Optimization Methods

Authors: Moheb R. Girgis, Tarek M. Mahmoud, Bahgat A. Abdullatif, Ahmed M. Rabie

Abstract:

Mesh clients, mesh routers and gateways are components of Wireless Mesh Network (WMN). In WMN, gateways connect to Internet using wireline links and supply Internet access services for users. We usually need multiple gateways, which takes time and costs a lot of money set up, due to the limited wireless channel bit rate. WMN is a highly developed technology that offers to end users a wireless broadband access. It offers a high degree of flexibility contrasted to conventional networks; however, this attribute comes at the expense of a more complex construction. Therefore, a challenge is the planning and optimization of WMNs. In this paper, we concentrate on this challenge using a genetic algorithm and simulated annealing. The genetic algorithm and simulated annealing enable searching for a low-cost WMN configuration with constraints and determine the number of used gateways. Experimental results proved that the performance of the genetic algorithm and simulated annealing in minimizing WMN network costs while satisfying quality of service. The proposed models are presented to significantly outperform the existing solutions.

Keywords: wireless mesh networks, genetic algorithms, simulated annealing, topology design

Procedia PDF Downloads 458
5046 Impacts of Online Behaviors on Empathy in Medical Students

Authors: Ling-Lang Huang, Yih-Jer Wu

Abstract:

Empathy is crucial for a patient-physician relationship and medical professionalism. Internet activity, gaming, or even addiction, have been more and more common among medical students. However, there’s been no report showing whether internet behavior has a substantial impact on empathy in medical students to our best knowledge. All year-2 medical students taking the optional course 'Narrative, Comprehension, and Communication' were enrolled. Internet behaviors are divided into two groups, 'internet users without online gaming (IU)' and 'internet users with online gaming (IG)', each group was further divided into 3 groups according to their average online retention time each day (< 2, 2 - 6, > 6 hours). Empathy was evaluated by the scores of the reports and humanities reflection after watching indicated movies, and by self-measured empathy questionnaire. All students taking the year-2 optional course 'Narrative, Comprehension, and Communication' were enrolled. As compared with students in the IU group, those in the IG group had significantly lower scores for the reports (81.3 ± 3.7 vs. 86.4 ± 5.1, P = 0.014). If further dividing the students into 5 groups (IU < 2, IU 2-6, IG < 2, IG 2 - 6, and IG > 6 hours), the scores were significantly and negatively correlated to online gaming with longer hours (r = -0.556, P = 0.006). However, there was no significant difference between IU and IG groups (33.0 ± 5.4 vs. 34.8 ± 3.2, P = n.s.), in terms of scores in the self-measured empathy questionnaire, neither was there any significant trend of scores along with longer online hours across the 5 groups (r = -0.164, P = n.s.). To date, there has been no evidence showing whether different internet behaviors (with or without online gaming) have distinct impacts on empathy. Although all of the medical students had a similarly good self-perception for empathy, our data suggested that online gaming did have a negative impact on their actual expression of empathy. Our observation has brought up an important issue for pondering: May IT- or gaming-assisted medical learning actually harm students’ empathy? In conclusion, this data suggests that long hours of online gaming harms expression of empathy, though all medics think themselves a person of high empathy.

Keywords: empathy. Internet, medical students, online gaming

Procedia PDF Downloads 132
5045 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender

Authors: Velly Anatasia

Abstract:

In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.

Keywords: Internet shopping, age groups, gender, income, electronic commerce

Procedia PDF Downloads 336
5044 Investigation of the Relationship between Digital Game Playing, Internet Addiction and Perceived Stress Levels in University Students

Authors: Sevim Ugur, Cemile Kutmec Yilmaz, Omer Us, Sevdenur Koksaldi

Abstract:

Aim: This study aims to investigate the effect of digital game playing and Internet addiction on perceived stress levels in university students. Method: The descriptive study was conducted through face-to-face interview method with a total of 364 university students studying at Aksaray University between November 15 and December 30, 2017. The research data were collected using personal information form, a questionnaire to determine the characteristics of playing digital game, the Internet addiction scale and the perceived stress scale. In the evaluation of the data, Mann-Whitney U test was used for two-group comparison of the sample with non-normal distribution, Kruskal-Wallis H-test was used in the comparison of more than two groups, and the Spearman correlation test was used to determine the relationship between Internet addiction and the perceived stress level. Results: It was determined that the mean age of the students participated in the study was 20.13 ± 1.7 years, 67.6% was female, 35.7% was sophomore, and 62.1% had an income 500 TL or less. It was found that 83.5% of the students use the Internet every day and 70.6% uses the Internet for 5 hours or less per day. Of the students, 12.4% prefers digital games instead of spending time outdoors, 8% plays a game as the first activity in leisure time, 12.4% plays all day, 15.7% feels anger when he/she is prevented from playing, 14.8% prefers playing games to get away from his/her problems, 23.4% had his/her school achievement affected negatively because of game playing, and 8% argues with family members due to the time spent for gaming. Students who play games on the computer for a long time were found to feel back pain (30.8%), headache (28.6%), insomnia (26.9%), dryness and pain in the eyes (26.6%), pain in the wrist (21.2%), feeling excessive tension and anger (16.2%), humpback (12.9), vision loss (9.6%) and pain in the wrist and fingers (7.4%). In our study, students' Internet addiction scale mean score was found to be 45.47 ± 16.1 and mean perceived stress scale score was 28.56 ± 2.7. A significant and negative correlation (p=0.037) was found between the total score of the Internet addiction scale and the total score of the perceived stress scale (r=-0.110). Conclusion: It was found in the study that Internet addiction and perceived stress of the students were at a moderate level and that there was a negative correlation between Internet addiction and perceived stress levels. Internet addiction was found to increase with the increasing perceived stress levels of students, and students were found to have health problems such as back pain, dryness in the eyes, pain, insomnia, headache, and humpback. Therefore, it is recommended to inform students about different coping methods other than spending time on the Internet to cope with the stress they perceive.

Keywords: digital game, internet addiction, student, stress level

Procedia PDF Downloads 288
5043 Mental Health on Three Continents: A Comparison of Mental Health Disorders in the Usa, India and Brazil

Authors: Henry Venter, Murali Thyloth, Alceu Casseb

Abstract:

Historically, mental and substance use disorders were not a global health priority. Since the 1993 World Development Report, the importance of the contribution of mental health and substance abuse on the relative global burden associated with disease morbidity has been recognized with 300 million people worldwide suffering from depression alone. This led to an international effort to improve the mental health of populations around the world. Despite these efforts some countries remain at the top of the list of countries with the highest rate of mental illness. Important research questions were asked: Would there be commonalities regarding mental health between these countries; would there be common factors leading to the high prevalence of mental illness; and how prepared are these countries with mental health delivery? Findings from this research can aid organizations and institutions preparing mental health service providers to focus training and preparation to address specific needs revealed by the study. Methods: Researchers decided to compare three distinctly different countries at the top of the list of countries with the highest rate of mental illness, the USA, India and Brazil, situated on three different continents with different economies and lifestyles. Data were collected using archival research methodology, reviewing records and findings of international and national health and mental health studies to subtract and compare data and findings. Results: The findings indicated that India is the most depressed country in the world, followed by the USA (and China) with Brazil in Latin America with the greatest number of depressed individuals. By 2020 roughly 20% of India, acountry of over one billion citizens, will suffer from some form of mental illnees, yet there are less than 4,000 experts available. In the USA 164.8 million people were substance abusers and an estimate of 47.6 million adults, 18 or older, had any mental illness in 2018. That means that about one in five adults in the USA experiences some form of mental illness each year, but only 41% of those affected received mental health care or services in the past year. Brazil has the greatest number of depressed individuals, in Latin America. Adults living in Sao Paulo megacity has prevalence of mental disorders at greater levels than similar surveys conducted in other areas of the world with more than one million adults with serious impairment levels. Discussion: The results show that, despite the vast socioeconomic differences between the three countries, there are correlations regarding mental health prevalence and difficulty to provide adequate services including a lack of awareness of how serious mental illness is, stigma for seeking mental illness, with comorbidity a common phenomenon, and a lack of partnership between different levels of service providers, which weakens mental health service delivery. The findings also indicate that mental health training institutions have a monumental task to prepare personnel to address the future mental health needs in each of the countries compared, which will constitute the next phase of the research.

Keywords: mental health epidemiology, mental health disorder, mental health prevalence, mental health treatment

Procedia PDF Downloads 111
5042 An International Analysis of Career Development and Management Programs for High-Performance Athletes: A Perspective of Organizational Support

Authors: H. J. Hong

Abstract:

Sporting organizations are arguably responsible for encouraging high-performance athletes to balance their life and identity during their sporting career; sporting organizations can establish the motivational climate for high-performance athletes using athlete career development and management programs. The purpose of this article to provide an overview of career development and management programs in 20 countries and to examine the following seven features of the programs: (1) Which government-funded sporting organizations provide career development and management programs? (2) Which athletes are eligible to access the programs? (3) What are the aims and objectives of the programs? (4) What are the activities and content of the programs? (5) Who is responsible for the delivery of the programs within organizations (e.g., advisors, coordinators, service providers, counsellors, etc.)? (6) Do the sporting organizations have training and development programs for support services providers? and (7) Do the sporting organizations assess the programs in terms of the programs’ impact on high-performance athletes’ career development and management skills? Web-based data collection was conducted first. The author contacted the sporting organizations to clarify information as required by requesting further information via emails, international calls, video calls on Skype, and by visiting the sporting organizations and meeting with the practitioners (Fiji, Ireland, Korea, Scotland, Singapore, and Spain). By selecting comparable career development and management programs, the present study reviews programs across the world, identifying similarities, differences, and difficulties, so that sporting organizations and practitioners may enhance the quality of their programs. Since international comparisons of career development and management programs remain scarce, the findings deepen the knowledge of high-performance athletes’ career development, management, and transitions in the areas of organizational support programs.

Keywords: athletes' career development and management, athletes' psychological preparation, organizational support, sport career transition

Procedia PDF Downloads 125
5041 The Analysis of Internet and Social Media Behaviors of the Students in Vocational High School

Authors: Mehmet Balci, Sakir Tasdemir, Mustafa Altin, Ozlem Bozok

Abstract:

Our globalizing world has become almost a small village and everyone can access any information at any time. Everyone lets each other know who does whatever in which place. We can learn which social events occur in which place in the world. From the perspective of education, the course notes that a lecturer use in lessons in a university in any state of America can be examined by a student studying in a city of Africa or the Far East. This dizzying communication we have mentioned happened thanks to fast developments in computer technologies and in parallel with this, internet technology. While these developments in the world, has a very large young population and a rapidly evolving electronic communications infrastructure Turkey has been affected by this situation. Researches has shown that almost all young people in Turkey has an account in a social network. Especially becoming common of mobile devices causes data traffic in social networks to increase. In this study, has been surveyed on students in the different age groups and at the Selcuk University Vocational School of Technical Sciences Department of Computer Technology. Student’s opinions about the use of internet and social media has been gotten. Using the Internet and social media skills, purposes, operating frequency, access facilities and tools, social life and effects on vocational education etc. have been explored. Both internet and use of social media positive and negative effects on this department students results have been obtained by the obtained findings evaluating from various aspects. Relations and differences have been found out with statistic.

Keywords: computer technologies, internet use, social network, higher vocational school

Procedia PDF Downloads 542
5040 Between Subscribers of Two Telecommunication Providers in Indonesia: Factors Involved in Customer Retention

Authors: Frista Dearetha Marasabessy, Usep Suhud, Mohammad Rizan

Abstract:

The study objective was to compare influencing factors on customer retention of two brands – SimPATI and IM3 – of telecommunication services owned by Telkomsel and Indosat, two giant mobile telecommunication providers in Indonesia. The authors applied predictor variables including perceived tariff, perceived quality, switching barriers, and customer satisfaction. These variables were used after reviewing literature in quantitative studies on consumer behaviour relating to telecommunication services. This study used indicators adopted and adapted from literature. The quantitative data were gathered in Jakarta, involving 205 subscribers of SimPATI and 202 subscribers of IM3. The authors selected respondents purposively. Data were analysed using both exploratory and confirmatory factor analyses. Two fitted models were developed confirming factors that were involved in customer retention as stated on the proposed model: perceived tariff, perceived quality, switching barriers, and customer satisfaction. However, parts of the hypotheses were rejected.

Keywords: customer retention, switching barriers, telecommunication providers, structural equation model, SimPATI, IM3, Indonesia

Procedia PDF Downloads 351
5039 Impact Assessment of Information Communication, Network Providers, Teledensity, and Consumer Complaints on Gross Domestic Products

Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke

Abstract:

The study used secondary data from foreign and local organizations to explore major challenges and opportunities abound in Information Communication. The study aimed at exploring the tie between tele density (network coverage area) and the number of network subscriptions, probing if the degree of consumer complaints varies significantly among network providers, and assessing if network subscriptions do significantly influence the sector’s GDP contribution. Methods used for data analysis include Pearson product-moment correlation and regression analysis, and the Analysis of Variance (ANOVA) as well. At a two-tailed test of 0.05 confidence level, the results of findings established about 85.6% of network subscriptions were explained by tele density (network coverage area), and the number of network subscriptions; Consumer Complaints’ degree varied significantly among network providers as 80.158291 (F calculated) > 3.490295 (F critical) with very high confidence associated p-value = 0.000000 which is < 0.05; and finally, 65% of the nation’s GDP was explained by network subscription to show a high association.

Keywords: tele density, subscription, network coverage, information communication, consumer

Procedia PDF Downloads 43
5038 Service Strategy And Innovation In The Food Service Industry: Basis For Designing A Competitive Advantage Model

Authors: Ma. Dina Datiles Jimenez

Abstract:

Service strategy and service Innovation has something to do with the success of the foodservice business. The foodservice business nowadays has become more competitive, and technology driven. This study aimed to determine and investigate the service innovation and strategies of the food service industry and the challenges during the pandemic to serve as the basis for a competitive advantage model. The study used mixed methods, including descriptive quantitative and qualitative methods. The Metro Manila foodservice managers were the target population of the study, which consisted of an estimated 1500 respondents from the selected cities. The assessment of service innovation for the following dimensions: product-related dimension; market-related dimension; process-related dimension; and organization-related dimension, when classified according to profile, was very large for age, gender, and educational attainment. When respondents are classified according to profile, the service strategy in terms of customer service strategy, after-sales service strategy, maintenance service strategy, research and development-oriented service strategy, and operational services strategy were all assessed with a very large extent of implementation. There was a significant difference in all four aspects of service innovation when classified based on age. However, for gender, only the market and process dimensions showed significant differences, while the product and organization conveyed no significant differences. Consequently, the evidence was not enough to prove that educational attainment differs from one another on the four aspects of service innovation. There was sufficient evidence to prove that the ages differ from one another in all aspects of service strategies. While gender and educational attainment showed no significant difference in the assessment of service strategies, Training on the trends in the foodservice industry during the pandemic is offered; technical maintenance is evident; the company allotted budget for outsourcing training; the quality control system; and online customer feedback were revealed as major indicators for service strategy. Fear of viruses, limited customers, a minimal work force, and low revenues were identified as challenges faced by the foodservice industry.

Keywords: foodservice industry, service innovation, service strategy, competitive advantage, sustainability, technology

Procedia PDF Downloads 78
5037 Assessing the Informed Consent Practices during Normal Vaginal Delivery Process and Immediate Postpartum Care in Tertiary Level Hospitals of Bangladesh

Authors: Md. Abdul Karim, Syed Imran Ahmed, Pandora T. Hardtman

Abstract:

Informed consent is one of the basic human and ethical rights for childbearing women. It plays a central role in promoting informed decision making between patients and service providers during the labor process. It gives mothers rights to accept or reject any examination and/or procedure, increases the respect and dignity of the mother during pregnancy, delivery and postpartum care. To assess the practices of this right during normal vaginal delivery and immediate postpartum care in tertiary level hospital setting in Bangladesh, a quantitative study with cross-sectional design was conducted in Dhaka Medical College & Hospital (DMCH) and Sir Salimullah Medical College & Mitford Hospital (SSMCH) in Dhaka in November 2015. A prevalence-based sample size of 190 was calculated where prevalence, confidence interval and level of significance were at 9.7%, 98% and 5% respectively. The respondents were the mothers who gave normal vaginal childbirth within past 24 hours and received postpartum care there. They were selected through systematic random sampling technique and their face-to-face interview of 190 mothers was done using a structured questionnaire. Data were entered into the spreadsheet (MS Excel 2013 version) and descriptive analysis of findings was done. The result shows the complete absence of informed consent practices and mostly absence of consented care such as right to information, respect for choices of preferences for examination and/or procedure of childbearing women. Although 95% of the mothers were informed that they were being proceeded with normal vaginal delivery, their choice of preference was absent during the process. Only consent (not informed consent) was taken from 50%-72% mothers for examination (except breast examination ‘0%’) and 8%-83% for any procedures during postpartum care. Only one-ninth (11%) of the mothers could ask service providers regarding the services they received. No consent was taken from 3% of the mothers- neither in the labor process nor in postpartum care. This current practice doesn’t comply with the Respectful Maternity Care (RMC) Charter 2011. The issue is not even clarified in the current Standard Clinical Management Protocols of the country. So, improvement of the existing protocol and increased awareness are essential to address this right of child-bearing women and to practice it during normal vaginal delivery and postpartum care.

Keywords: informed consent, normal vaginal delivery, respectful maternity care, tertiary level hospital

Procedia PDF Downloads 158
5036 Preventing Discharge to No Fixed Address-Youth (NFA-Y)

Authors: Cheryl Forchuk, Sandra Fisman, Steve Cordes, Dan Catunto, Katherine Krakowski, Melissa Jeffrey, John D’Oria

Abstract:

The discharge of youth aged 16-25 from hospital into homelessness is a prevalent issue despite research indicating social, safety, health and economic detriments on both the individual and community. Lack of stable housing for youth discharged into homelessness results in long-term consequences, including exacerbation of health problems and costly health care service use and hospital readmission. People experiencing homelessness are four times more likely to be readmitted within one month of discharge and hospitals must spend $2,559 more per client. Finding safe housing for these individuals is imperative to their recovery and transition back to the community. People discharged from hospital to homelessness experience challenges, including poor health outcomes and increased hospital readmissions. Youth are the fastest-growing subgroup of people experiencing homelessness in Canada. The needs of youth are unique and include supports related to education, employment opportunities, and age-related service barriers. This study aims to identify the needs of youth at risk of homelessness by evaluating the efficacy of the “Preventing Discharge to No Fixed Address – Youth” (NFA-Y) program, which aims to prevent youth from being discharged from hospital into homelessness. The program connects youth aged 16-25 who are inpatients at London Health Sciences Centre and St. Joseph’s Health Care London to housing and financial support. Supports are offered through collaboration with community partners: Youth Opportunities Unlimited, Canadian Mental Health Association Elgin Middlesex, City of London Coordinated Access, Ontario Works, and Salvation Army’s Housing Stability Bank. This study was reviewed and approved by Western University’s Research Ethics Board. A series of interviews are being conducted with approximately ninety-three youth participants at three time points: baseline (pre-discharge), six, and twelve months post-discharge. Focus groups with participants, health care providers, and community partners are being conducted at three-time points. In addition, administrative data from service providers will be collected and analyzed. Since homelessness has a detrimental effect on recovery, client and community safety, and healthcare expenditure, locating safe housing for psychiatric patients has had a positive impact on treatment, rehabilitation, and the system as a whole. If successful, the findings of this project will offer safe policy alternatives for the prevention of homelessness for at-risk youth, help set them up for success in their future years, and mitigate the rise of the homeless youth population in Canada.

Keywords: youth homelessness, no-fixed address, mental health, homelessness prevention, hospital discharge

Procedia PDF Downloads 103
5035 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 166
5034 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 113
5033 An Algorithm Based on Control Indexes to Increase the Quality of Service on Cellular Networks

Authors: Rahman Mofidi, Sina Rahimi, Farnoosh Darban

Abstract:

Communication plays a key role in today’s world, and to support it, the quality of service has the highest priority. It is very important to differentiate between traffic based on priority level. Some traffic classes should be a higher priority than other classes. It is also necessary to give high priority to customers who have more payment for better service, however, without influence on other customers. So to realize that, we will require effective quality of service methods. To ensure the optimal performance of the network in accordance with the quality of service is an important goal for all operators in the mobile network. In this work, we propose an algorithm based on control parameters which it’s based on user feedback that aims at minimizing the access to system transmit power and thus improving the network key performance indicators and increasing the quality of service. This feedback that is known as channel quality indicator (CQI) indicates the received signal level of the user. We aim at proposing an algorithm in control parameter criterion to study improving the quality of service and throughput in a cellular network at the simulated environment. In this work we tried to parameter values have close to their actual level. Simulation results show that the proposed algorithm improves the system throughput and thus satisfies users' throughput and improves service to set up a successful call.

Keywords: quality of service, key performance indicators, control parameter, channel quality indicator

Procedia PDF Downloads 203
5032 Factors Affecting Mobile Internet Adoption in an Emerging Market

Authors: Maha Mourad, Fady Todros

Abstract:

The objective of this research is to find an explanatory model to define the most important variables and factors that affect the acceptance of Mobile Internet in the Egyptian market. A qualitative exploratory research was conducted to support the conceptual framework followed with a quantitative research in the form of a survey distributed among 411 respondents. It was clear that relative advantage, complexity, compatibility, perceived price level and perceived playfulness have a dominant role in influencing consumers to adopt mobile internet, while observability is correlated to the adoption but when measured with the other factors it lost its value. The perceived price level has a negative relationship with the adoption as well the compatibility.

Keywords: innovation, Egypt, communication technologies, diffusion, innovation adoption, emerging market

Procedia PDF Downloads 452
5031 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 15
5030 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 467
5029 Evidence-Based Health System Strengthening in Urban India: Drawing Insights from Rapid Assessment Study

Authors: Anisur Rahman, Sabyasachi Behera, Pawan Pathak, Benazir Patil, Rajesh Khanna

Abstract:

Background: Nearly half of India’s population is expected to reside in urban areas by 2030. The extent to which India's health system can provide for this large and growing city-based population will determine the country's success in achieving universal health coverage and improved national health indices. National Urban Health Mission (NUHM) strive for improving access to primary health care in urban areas. Implementation of NUHM solicits sensitive, effective and sustainable strategies to strengthen the service delivery mechanisms. The Challenge Initiative for Healthy Cities (TCIHC) is working with the Government of India and three provincial states to develop effective service delivery mechanisms for reproductive, maternal, newborn and child health (RMNCH) through a health systems approach for the urban poor. Method: A rapid assessment study was conceptualized and executed to generate evidence in order to address the challenges impeding in functioning of urban health facilities to deliver effective, efficient and equitable health care services in 7 cities spread across two project States viz. Madhya Pradesh and Odisha. Results: The findings of the assessment reflect: 1. The overall ecosystem pertaining to planning and management of public health interventions is not conducive. 2. The challenges regarding population dynamics like migration keeps on influencing the demand-supply-enabling environment triangle for both public and private service providers. 3. Lack of norms for planning and benchmark for service delivery further impedes urban health system as a whole. 4. Operationalization of primary level services have enough potential to meet the demand of slum dwellers at large. 5. Lack of policy driven strategies on how to integrate the NUHM with other thematic areas of Maternal, Newborn & Child Health (MNCH) and Family Planning (FP). 5. The inappropriate capacity building and acute shortage of Human Resources has huge implication on service provisioning and adherence to the service delivery protocols. Conclusion: The findings from rapid assessment are aimed to inform pertinent stakeholders to develop a multiyear city health action plan to strengthen the health systems in order to improve the efficacy of service delivery mechanism in urban settings.

Keywords: city health plan, health system, rapid assessment, urban mission

Procedia PDF Downloads 169
5028 Implementing Internet of Things through Building Information Modelling in Order to Assist with the Maintenance Stage of Commercial Buildings

Authors: Ushir Daya, Zenadene Lazarus, Dimelle Moodley, Ehsan Saghatforoush

Abstract:

It was found through literature that there is a lack of implementation of the Internet of Things (IoT) incorporated into Building Information Modelling (BIM) in South Africa. The research aims to find if the implementation of IoT into BIM will make BIM more useful during the maintenance stage of buildings and assist facility managers when doing their job. The research will look at the existing problematic areas with building information modelling, specifically BIM 7D. This paper will look at the capabilities of IoT and what issues IoT will be able to resolve in BIM software, as well as how IoT into BIM will assist facility managers and if such an implementation will make a facility manager's job more efficient.

Keywords: internet of things, building information modeling, facilities management, structural health monitoring

Procedia PDF Downloads 208
5027 Privacy Rights of Children in the Social Media Sphere: The Benefits and Challenges Under the EU and US Legislative Framework

Authors: Anna Citterbergova

Abstract:

This study explores the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, namely the GDPR (2018) and COPPA (2000). Considering that children are online for the majority of their free time, one cannot overlook the negative side effects that may be associated with online participation, which may put children’s wellbeing and their fundamental rights at risk. The question of whether the current relevant legislative framework in relation to the responsibilities of the internet service providers (ISPs) are adequate safeguards and guarantees to children’s personal data protection has been an evolving debate both in the US and in the EU. From a children’s rights perspective, processors of personal data have certain obligations that must meet the international human rights principles (e. g. the CRC, ECHR), which require taking into account the best interest of the child. Accordingly, the need to protect children’s privacy online remains strong and relevant with the expansion of the number and importance of social media platforms to human life. At the same time, the landscape of the internet is rapidly evolving, and commercial interests are taking a more targeted approach in seeking children’s data. Therefore, it is essential to constantly evaluate the ongoing and evolving newly adopted market policies of ISPs that may misuse the gap in the current letter of the law. Previous studies in the field have already pointed out that both GDPR and COPPA may theoretically not be sufficient in protecting children’s personal data. With the focus on social media platforms, this study uses the doctrinal-descriptive method to identifiy the mechanisms enshrined in the GDPR and COPPA designed to protect children’s personal data. In its second part, the study includes a data gathering phase by the national data protection authorities responsible for monitoring and supervision of the GDPR in relation to children’s personal data protection who monitor the enforcement of the data protection rules throughout the European Union an contribute to their consistent application. These gathered primary source of data will later be used to outline the series of benefits and challenges to children’s persona lata protection faced by these institutes and the analysis that aims to suggest if and/or how to hold ISPs accountable while striking a fair balance between the commercial rights and the right to protection of the personal data of children. The preliminary results can be divided into two categories. First, conclusions in the doctrinal-descriptive part of the study. Second, specific cases and situations from the practice of national data protection authorities. While for the first part, concrete conclusions can already be presented, the second part is currently still in the data gathering phase. The result of this research is a comprehensive analysis on the safeguards and guarantees to children’s personal data protection under the current EU and US legislative framework, based on doctrinal-descriptive approach and original empirical data.

Keywords: personal data of children, personal data protection, GDPR, COPPA, ISPs, social media

Procedia PDF Downloads 96
5026 Integrated Information Approach to Inbound Logistics in Indian Steel Sector

Authors: N. Jena, Nitin Seth

Abstract:

Globalization and free trade has forced the organizations to continuously rethink and rework on the increasing cost of logistics. World wide, it is visualized that on one side the steel sector is witnessing rapid growth and on the other side it is facing huge challenges in terms of availability of raw materials for uninterrupted production. Inbound logistics also gains significant importance for ensuring the timely availability of raw materials. It is seen that in Indian steel sector logistic cost is still very large and challenging. Effectively managing the inbound logistics in steel decides the profitability and serviceability of the organization. Effective management of inbound logistics also has a major role on the inventory of the organization. Since, the logistics for the steel industry in India is evolving rapidly and it is the interplay of infrastructure, technology and new types of service providers that will define whether the industry is able to help its customers to reduce their logistics costs. Integration of Logistics has been treated as one of the most potential area for the companies to provide a base for cost reduction. In spite of the proven area for benefits for the industry, it is very surprising that none of the researchers have explored this area. Although, many researchers explored the subject of logistics in steel industry, but their perspective varied from exploring and understanding the associated cost and finding out the relations between them. Visualizing a potential gap, the present research is under taken to explore the integration opportunities in inbound logistics for steel sector. Typically in Indian steel sector where in most of the manufacturers depend on imported materials for processing the logistics is very challenging and accounts for transactions at supplier – who is situated in different country, shipper- who is transporting the material to the host country, regulators in both countries-that include customs and various clearing agents, local logistics service providers and local transporters/handlers. It is seen that In bound logistics cost in the steel sector is very high and accounts for about 15-16% of the turn over, integration of information across different channels provides and opportunity for improvements and growth of the organization. In the present paper, a case of leading steel manufacturer has been taken and the potentials for integration of information across various partners have been identified. The paper provides the identification of grey area in steel sector for major improvements in cycle time and lowering the inventories by integration of information. Finally, based on integration of information, the paper presents a business information framework for steel sector.

Keywords: integration, steel sectors, suppliers, shippers, customs and cargo agents, transporters

Procedia PDF Downloads 341
5025 A Method for Consensus Building between Teachers and Learners in a Value Co-Creative Learning Service

Authors: Ryota Sugino, Satoshi Mizoguchi, Koji Kimita, Keiichi Muramatsu, Tatsunori Matsui, Yoshiki Shimomura

Abstract:

Improving added value and productivity of services entails improving both value-in-exchange and value-in-use. Value-in-use is realized by value co-creation, where providers and receivers create value together. In higher education services, value-in-use comes from learners achieving learning outcomes (e.g., knowledge and skills) that are consistent with their learning goals. To enhance the learning outcomes of a learner, it is necessary to enhance and utilize the abilities of the teacher along with the abilities of the learner. To do this, however, the learner and the teacher need to build a consensus about their respective roles. Teachers need to provide effective learning content; learners need to choose the appropriate learning strategies by using the learning content through consensus building. This makes consensus building an important factor in value co-creation. However, methods to build a consensus about their respective roles may not be clearly established, making such consensus difficult. In this paper, we propose some strategies for consensus building between a teacher and a learner in value co-creation. We focus on a teacher and learner co-design and propose an analysis method to clarify a collaborative design process to realize value co-creation. We then analyze some counseling data obtained from a university class. This counseling aimed to build a consensus for value-in-use, learning outcomes, and learning strategies between the teacher and the learner.

Keywords: consensus building, value co-creation, higher education, learning service

Procedia PDF Downloads 301